AirMagnet Enterprise
|
|
- Lionel Greer
- 5 years ago
- Views:
Transcription
1 DATASHEET AirMagnet Enterprise AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that enables organizations to meet security, performance and compliance demands of today s mobile workforce. Complete Insight into Wi-Fi network Performance & Security status to proactively achieve the best quality of end-user experience SmartEdge Wi-Fi (802.11n and ac) & Wi-Fi/Cellular Spectrum sensors Automated Health Check for the WLAN AP Infrastructure pinpoints and diagnoses problems impacting Wi-Fi connectivity, performance, and WLAN network security Centralized WIPS solution with comprehensive threat detection, threat location & remediation vs unauthorized rogue devices or any internal/external policy violator Dynamic Threat Update technology for immediate wireless intrusion prevention of new threats Forensic analysis and event triangulation for rapid response Auditor-ready regulatory compliance reporting AirMagnet Enterprise AirMagnet Enterprise centralized wireless intrusion detection/prevention system (WIDS/WIPS) defends your wireless environment by automatically detecting, blocking, tracing and locating any threat on all Wi-Fi channels. It contains an unmatched suite of event alerting, escalation, remote troubleshooting, forensic analysis, network health check, and professional PCI and other policy compliance reporting. The end result is a uni ed system that scans your environment 100% of the time to ensure your WLAN is performing safely and securely and is meeting the needs of your users and applications. In addition to rich security features, AirMagnet Enterprise constantly monitors the health and performance of the WLAN and RF environment to proactively detect evolving problems that can lead to network interruption. The system detects issues, gives users remediation advice and includes active remote tools to troubleshoot the issue. This allows sta to avoid network downtime and vastly reduces the time-to- x for any outage, leading to greater uptime, better performance and overall higher end-user satisfaction. AirMagnet Enterprise is vendor agnostic and provides an independent view into the security and performance of the wireless Access Point (AP) infrastructure (controller and cloud-based). 1/12
2 AirMagnet Enterprise Complete Cellular and Wi-Fi Security AirMagnet Enterprise protects against every wireless threat by combining the industry's most thorough wireless monitoring with leading research, analysis and threat remediation. Full Visibility AirMagnet Enterprise scans all possible wireless network channels (including the 200 extended non-standard channels), ensuring there are no blind spots where rogue devices may be hiding. AirMagnet Enterprise goes beyond Wi-Fi analysis with optional spectrum analysis that detects and classi es RF jamming attacks, Bluetooth devices and many other non transmitter types, such as unapproved wireless cameras. Industry Leading Threat Detection The AirMagnet Security Research Team constantly investigates the latest hacking techniques, trends and potential vulnerabilities to keep organizations ahead of evolving threats. Our Dynamic Threat Update (DTU) technology speeds the creation, automation and immediate deployment of new threat signatures. New DTU signatures can be deployed immediately with no impact to system operation, providing a unique framework for maintaining the most up-to-date WLAN security posture. Dynamic threat update The AirWISE engine constantly analyzes all wireless devices and tra c using a combination of frame inspection, stateful pattern analysis, statistical modeling, RF analysis and anomaly detection. This enables detection of hundreds of speci c threats, attacks and vulnerabilities such as rogue devices, spoofed devices, DoS attacks, man-in-the-middle attacks, evil twins, as well as the most recent hacking tools and techniques such as MDK3, Karmetasploit and n DoS attacks. 2/12
3 9/11/2017 AirMagnet Enterprise Datasheet NETSCOUT Automated Response and Network Protection AirMagnet Enterprise provides a full arsenal of remediation and investigation options that can be triggered by policy to ensure that WLAN problems are quickly and accurately detected and that appropriate automated protection mechanisms are activated. Threat Tracing, Blocking/Suppression and Mapping All devices are traced using a suite of wired and wireless tracing methods to quickly and reliably determine if a device is connected to the network. The system uses a newly enhanced set of sophisticated techniques, including use of SNMP, automated switch discovery, and hardware and tra c analysis, to ensure accurate, fast tracing in any network topology. Rogue management Threats can be manually or automatically remediated with a combination of both wired and wireless threat suppression. Wireless blocking targets a threat at the source and speci cally blocks the targeted wireless device from making any wireless connections. Wired blocking automatically closes the wired switch port where a threat has been traced. All threats and devices can be located on a map or oor plan and be set to trigger rogue alarms based on the device's location. Event Forensics AirMagnet Enterprise captures a complete packet or RF forensic record of any network event, allowing appropriate sta to investigate the issue in depth, at any time. Rogue device detected and traced Noti cation and Integration Managers have access to more than a dozen noti cation and escalation mechanisms, making it easy to alert speci c sta members of issues or integrate wireless event data into larger enterprise management systems and operations. Flexible Sensor Architecture The SmartEdge Sensors support one or two Wi-Fi radios and dedicated Wi-Fi or cellular spectrum analysis. This design also enables a wireless connection from the sensor, eliminating the need for costly Ethernet cabling, or simultaneous security monitoring and performance testing. Locate rogue device on a oor map 3/12
4 Best of Breed Security Architecture AirMagnet Enterprise o ers the only solution in the industry to meet the established standards of a mission-critical security application. It is the only system to build fault-tolerance into each component, with fail-over boot images in every sensor and automatic server fail-over licenses that come standard with the system. Additionally, AirMagnet Enterprise sensors can operate as fully independent IDS/IPS nodes detecting and remediating threats without losing information, even if the network connection to the server is lost for days. Additional unique bene ts of the AirMagnet Enterprise architecture include: Massive Scalability With intelligent sensors that locally analyze Wi-Fi, cellular and RF conditions, more than 1,000 sensors can be supported through a single centralized server in the data center, requiring minimal network bandwidth. Highest System Resilience Processing at the sensor level means that each sensor continues to enforce the security policy even if connection to the server is lost for more than 24 hours. Hot standby server software (included) enables fully redundant datacenter operations for maximum wireless security protection. Noti cation options Designed for Correlation The AirMagnet Enterprise server continuously correlates analysis from all sensors, ensuring that intelligence is always coordinated across the entire enterprise. AirMagnet Sensor 4/12
5 AirMagnet Enterprise System 5/12
6 Performance Optimization and Troubleshooting Performance and reliability of a WLAN are often directly tied to the value a wireless network delivers to an organization. AirMagnet Enterprise technology has consistently been at the forefront of innovation, developing into wireless network monitoring solutions that help IT professionals identify and mitigate WLAN problems before they impact users. By digging into the root-cause of any issue and arming users with the critical tools needed to resolve problems when they happen, AirMagnet Enterprise ensures wireless networks can reliably support business-critical applications. AirWISE alarm with cellular security events AirMagnet Enterprise provides a 24x7 spectrum security solution empowering customers to enforce uni ed no wireless (cellular and Wi-Fi) zones. It o ers detection, monitoring, and remediation of spectrum activity in a broad frequency range that includes 3G, 4G LTE, and CDMA. Activity by cellular devices like cell phones and jammers is tracked and reported. In addition, AirMagnet Enterprise monitors and reports on 4 types of cellular security violation events: Mobile cellular events, e.g., calls made from a speci c cellular network Cellular interference events, e.g., cellular jammers Non-cellular energy events, e.g., events taking place outside of the country's allocated cellular bandwidth Cellular spectrum analyzer with security events Base station cellular events, e.g., base station beacons Location of cellular event Provide cellular operator information For further analysis, users can access sensor's built-in cellular spectrum analyzer. This avoids costly truck-rolls and reduce time to resolution. Access Point Listing 6/12
7 Find Outages and Emerging Problems Before Users are A ected Powered by the Automated Health Check (AHC), AirMagnet Enterprise sensors and Software Sensor Agents actively test and verify complete WLAN connectivity from the wireless link all the way through to application servers or the internet, automatically detecting critical outages or network degradation while pinpointing the exact source of trouble. Sensors running AHC tests provide a true client perspective, as they fully authenticate to the network and proactively probe for problems, which can be related to WLAN issues or other network resources. This provides network sta with immediate and speci c information on the root cause, so they can respond often before users are impacted. Comprehensive Wireless Analysis AirMagnet Enterprise identi es and generates AirWISE alarms for performance issues such as tra c congestion, overloaded devices and channels, device miscon gurations, collisions, roaming problems and QoS issues. Tools for optimization enable network sta to ensure that their WLAN investment is delivering the expected real-world performance to users. Extensive RF Interference Analysis AirMagnet Enterprise is the only WLAN monitoring system supporting dedicated spectrum analysis hardware in the sensor for the most accurate and complete RF interference detection and remote real-time analysis. The environment is scanned 100 percent of the time over both 2.4 GHz and 5 GHz Wi-Fi bands, and speci cally classi es interference sources like video cameras, cordless phones and microwave ovens, which can seriously impact the performance of the WLAN. Real-time Remote Troubleshooting AirMagnet Enterprise allows IT professionals to troubleshoot wireless problems remotely to x problems faster and without costly "truck rolls". AirMagnet Enterprise sensors contain a real-time analysis interface based on AirMagnet Wi-Fi Analyzer and Spectrum XT, enabling sta to track utilization and bandwidth, view real-time decodes, as well as troubleshoot user connectivity and RF interference problems without leaving their desks. 7/12
8 Simple Policy-Driven Management As Wi-Fi adoption continues to expand, it is increasingly important for network managers and wireless professionals to leverage tools that allow them to easily cut through the ood of Wi-Fi data and devices, revealing the information that matters most. AirMagnet Enterprise does this with tools that easily classify new Wi-Fi devices, score and prioritize issues in the network and share timely information with network sta and management systems. Automatic Device Classi cation The AirMagnet Enterprise device classi cation engine allows a user to easily and accurately identify Wi-Fi devices as rogue, neighbors, monitored or approved devices. Classi cation rules are built using simple straightforward sentences and Boolean rules to classify devices based on their wired traced status, the device vendor, security settings, signal level, association history and variety of other factors. The system also allows managers to preview new rules so they can see what devices will be reclassi ed and catch any problems before the policy is pushed live. Dashboard view of top WLAN issues Finding the Information that Matters The AirMagnet Enterprise dashboard shows key headline information for all major job roles including the top security issues, performance issues, problem devices and compliance issues. All threats are correlated and scored according to user-controlled policies. This allows sta to quickly see and prioritize important events, and see devices that are at the root of multiple problems. Focus on Users The system also includes a concept of VIP users or devices, allowing sta to prioritize alarms a ecting key resources. Similarly, events are scored on their impact to the network, letting sta prioritize issues that are a ecting many users versus lower-impact issues. PCI compliance summary Compliance Reports AirMagnet Enterprise outputs detailed compliance reports covering a variety of regulatory standards including Sarbanes-Oxley, HIPAA, PCI 3.2, DSS GLBA, DoD , ISO 27001, BASEL 2 and CAD3. Reports provide a step-by-step pass/fail assessment of each section of the standard. As a result, IT sta can take the guesswork out of compliance audits and complete work in a fraction of the time. Integrated Reporting AirMagnet Enterprise's integrated reporting engine makes it easy to generate professional customized reports for any location or date range. Reports cover all areas of management including cellular security events, RF statistics, device reports, security and performance reports. Reports can be scheduled to run at regular intervals and delivered to key managers by /12
9 Ordering Information Model AM/A5505G-ENT Description AirMagnet Enterprise Server plus Add-On License, no sensors included, sw AM/A5311G AirMagnet Enterprise Server License for Software Sensor Agent (100) SENSOR4-R1S1W1-E SENSOR4-R2S1-I SENSOR4-R2S1-E SENSOR6-R2S1-I SENSOR6-R2S1-E SENSOR6-R1S0W1-E AM/A5032 CABLEKIT-SENSOR4 AirMagnet Sensor, cellular spectrum, 4th Gen, 1 X 11n Radio, External Ant. [802.11n sensor] AirMagnet Spectrum, 4th Gen, 2 X 11n Radio, Internal Ant. [802.11n sensor] AirMagnet Spectrum, 4th Gen, 2 X 11n Radio, External Ant. [802.11n sensor] SmartEdge Sensor, 2 X 11AC WI-FI Radio with Spectrum, Internal ANT [802.11ac sensor] SmartEdge Sensor, 2 X 11AC WI-FI Radio with Spectrum, External ANT [802.11ac sensor] SmartEdge Sensor, 1 X 11AC WI-FI Radio and Cellular, External ANT [802.11ac sensor] Power Injector for AirMagnet Sensors Console Cable Kit for Sensor 4 Series Note: The AirMagnet Enterprise system requires a server/database. Users can purchase a server from NetScout or use their own server that meets the minimum requirements below. 9/12
10 System Requirements AirMagnet Enterprise Hardware/VM Speci cations IMPORTANT NOTES Deployments over 100 sensors require that the AirMagnet Enterprise server software and database are installed on separate physical machines Drive partition for AirMagnet Enterprise server must have at least 50 GB free disk space AirMagnet Enterprise STANDALONE HARDWARE SPECIFICATIONS Recommended Hardware (Small - Support 1 to 100 Sensors) AirMagnet Enterprise Primary / Failover Server AirMagnet Enterprise Database Server * (1) 2.4 GHz, 4 core, 8 threads, 10 M Cache (1) 2.4 GHz, 4 core, 8 threads, 10 M Cache 16 GB Memory RDIMM 16 GB Memory RDIMM (2) 200 GB 10 K Near Line SAS (Raid 1) (2) 200 GB 10 K Near Line SAS (Raid 1) Microsoft Windows Server 2012 R2, bit Microsoft SQL Server 2012/2014/2016 or PostgreSQL version 9.1.x **, Gbps or faster Ethernet connection 1 Gbps or faster Ethernet connection Notes: * Presumes DB Server is dedicated to AirMagnet Enterprise Services only ** AirMagnet Enterprise DB Instance can reside in existing MS-SQL or PostgreSQL farm Recommended Hardware (Medium - Support 101 to 500 Sensors) AirMagnet Enterprise Primary / Failover Server (1) 2.4 GHz, 8 core, 16 threads, 20 M Cache AirMagnet Enterprise Database Server * (1) 2.4 GHz, 8 core, 16 threads, 20 M Cache 32 GB Memory RDIMM 16 GB Memory RDIMM (2) 300 GB 15 K RPM SAS (Raid 1) (2) 300 GB 15 K RPM SAS (Raid 1) Microsoft Windows Server 2012 R2, bit Microsoft SQL Server 2012/2014/2016 or PostgreSQL version 9.1.x **, Gbps or faster Ethernet connection 1 Gbps or faster Ethernet connection Notes: * Presumes DB Server is dedicated to AirMagnet Enterprise Services only ** AirMagnet Enterprise DB Instance can reside in existing MS-SQL or PostgreSQL farm Recommended Hardware (Large - Support 501 to 1000 Sensors) AirMagnet Enterprise Primary / Failover Server (2) 2.4 GHz, 8 core, 16 threads, 20 M Cache AirMagnet Enterprise Database Server * (2) 2.4 GHz, 8 core, 16 threads, 20 M Cache 64 GB Memory, RDIMM 32 GB Memory, RDIMM 10/12
11 (2) 500 GB 15 K RPM SAS (Raid 1) (2) 500 GB 15 K RPM SAS (Raid 1) Microsoft Windows Server 2012 R2, bit Microsoft SQL Server 2012/2014/2016 or PostgreSQL version 9.1.x **, Gbps or faster Ethernet connection 1 Gbps or faster Ethernet connection Notes: * Presumes DB Server is dedicated to AirMagnet Enterprise Services only ** AirMagnet Enterprise DB Instance can reside in existing MS-SQL or PostgreSQL form 11/12
12 AirMagnet Enterprise Server Virtual Machine Speci cations Recommended Con guration Recommended AirMagnet Enterprise Virtual Machine Speci cations Deployment vcpus Clock Speed (GHz) Memory Allocated Disk Space Sensor Limit* Small GB 200 GB Medium GB 300 GB Recommended Database Server Virtual Machine Speci cations Deployment vcpus Clock Speed (GHz) Memory Allocated Disk Space Small GB 200 GB Medium GB 300 GB Notes: * Dependant on Wi-Fi and RF environment, number of Wi-Fi devices monitored and policy complexity Refer to Microsoft documentation for Transaction Log speci cations and maintenance Recommendation: Operating System: Microsoft Windows Server 2012 R2, bit Recommended Database software: Microsoft SQL 2012/2014/2016 or PostgreSQL 9.1.x, AirMagnet Enterprise Console Recommended Con guration Intel Core i5 or greater Microsoft Windows 7 Enterprise/Professional (Service Pack 1) 64-bit Microsoft Windows Pro/Enterprise bit Microsoft Windows 10 Pro/Enterprise 64-bit 8 GB RAM or greater Ethernet connection AirMagnet Software Sensor Agent Recommended Con guration Microsoft Windows 7 Enterprise/Professional (Service Pack 1) 64-bit Enabled a/b/g/n/ac wireless adapter 8GB RAM or greater Since SSA client is run as Window services, the user needs to have administrative rights on the machine in order for the SSA client to be installed successfully 12/12
AirMagnet Enterprise DATASHEET
DATASHEET AirMagnet Enterprise AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that enables organizations to
More informationAirMagnet Enterprise DATA SHEETS PRINT
DATA SHEETS PRINT AirMagnet Enterprise AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that enables organizations
More informationDATA SHEETS. 99 Washington Street Melrose, MA Phone Toll Free Visit us at
DATA SHEETS Datasheet: AirMagnet Enterprise DATASHEET AME AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that
More informationDATA SHEETS. 99 Washington Street Melrose, MA Phone Toll Free Visit us at
DATA SHEETS Datasheet: AirMagnet Wi-Fi Analyzer AirMagnet Wi-Fi Analyzer PRO helps IT staff Troubleshoot, Analyze, and Audit their wireless network. Quickly solve end-user issues while automatically detecting
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationThe Modern Manufacturer s Guide to. Industrial Wireless Cisco and/or its affiliates. All rights reserved.
The Modern Manufacturer s Guide to Industrial Wireless 2017 Cisco and/or its affiliates. All rights reserved. The Modern Manufacturer s Guide to Industrial Wireless Page 2 It s hard to imagine an effective
More informationCisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion
Cisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion What You Will Learn The wireless spectrum is a new frontier for many IT organizations. Like any other networking medium,
More informationIBM Internet Security Systems Proventia Management SiteProtector
Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and
More informationWhite Paper: How to Keep Your WLAN Healthy
WHITE PAPER White Paper: How to Keep Your WLAN Healthy Keeping a wireless network healthy and performing at peak efficiency requires timely, actionable insight into emerging problems. Escalating demand
More informationExtremeWireless WiNG NX 9500
DATA SHEET ExtremeWireless WiNG NX 9500 Integrated Services Platform Series for the Private Cloud FEATURES COMPLETE VISIBILITY OF THE ENTIRE DISTRIBUTED DEPLOYMENT One point of configuration; ExtremeWireless
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationARUBA AIRWAVE. Visibility and management for multi-vendor access networks DATA SHEET REAL-TIME MONITORING AND VISIBILITY
Visibility and management for multi-vendor access networks Aruba AirWave is an easy-to-use network operations system that manages wired and wireless infrastructure from Aruba and a wide range of third-party
More informationHiveManager Local Cloud
DATA SHEET HiveManager Local Cloud Enterprise Access Network Management Offering Intuitive Configuration Workflows, Real-Time & Historical Monitoring, and Simplified Troubleshooting DATASHEET HiveManager
More informationNX 9500 INTEGRATED SERVICES PLATFORM SERIES FOR THE PRIVATE CLOUD
PRODUCT SPEC SHEET NX 9500 INTEGRATED SERVICES PLATFORM SERIES FOR THE PRIVATE CLOUD NX 9500 INTEGRATED SERVICES PLATFORM SERIES FOR THE PRIVATE CLOUD CENTRALIZED SERVICE DELIVERY AND MANAGEMENT PLATFORM
More informationARUBA AIRWAVE. Management and monitoring for multi-vendor campus networks DATA SHEET CONNECTIVITY ANALYTICS REAL-TIME MONITORING AND VISIBILITY RAPIDS
Management and monitoring for multi-vendor campus networks Aruba AirWave is an easy-to-use network operations system that manages wired and wireless infrastructure from Aruba and a wide range of third-party
More informationUnlocking the Power of the Cloud
TRANSFORM YOUR BUSINESS With Smarter IT Unlocking the Power of the Cloud Hybrid Networking Managed Security Cloud Communications Software-defined solutions that adapt to the shape of your business The
More informationA Case for the 3 rd Radio. Robin Jellum / Director, Technical Marketing
A Case for the 3 rd Radio Robin Jellum / Director, Technical Marketing Increasing Demands on WiFi Networks Risk & Complexity Bandwidth Security Threats Devices Performance Users Resources Gap IT Team IT
More informationDATA SHEETS. Datasheet: AirMagnet Survey
DATA SHEETS Datasheet: AirMagnet Survey AirMagnet Survey is ideal for planning and designing 802.11 a/b/g/n/ac wireless LANs for optimal performance, security and compliance. It calculates the ideal quantity,
More informationUNIFICATION OF TECHNOLOGIES
UNIFICATION OF TECHNOLOGIES SIEM Management Incident Management Risk Intelligence Storage Detection Prevention Awareness Security Technology IDS/IPS WIDS Vulnerability Assessment Identity Unified SIEM
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationPRODUCT GUIDE Wireless Intrusion Prevention Systems
PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing
More informationFluke Networks: A company you can trust
Fluke Networks: A company you can trust For nearly two decades, Fluke Networks has provided innovative solutions used by enterprises and telecommunications carriers to provide their network installers,
More informationSOLUTION BRIEF EXTREMEWIRELESS WiNG AZARA AZARA. WiNG RISE TO THE CHALLENGE OF PROVIDING SUPERIOR CONNECTIVITY & WLAN MANAGEMENT
SOLUTION BRIEF WiNG AZARA RISE TO THE CHALLENGE OF PROVIDING SUPERIOR CONNECTIVITY & WLAN MANAGEMENT Freedom from the unpredictability of providing connectivity Today, mobile devices outnumber the total
More informationSIEMLESS THREAT DETECTION FOR AWS
SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting
More informationTroubleshooting Common Wi-Fi Problems
Troubleshooting Common Wi-Fi Problems It just has to work! Tom Resman - NetScout IT Professional Wi-Fi Trek 2016 What Wi-Fi Complaints Do You Typically Get? The Wi-Fi is too slow I keep getting disconnected
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationQuickSpecs. Aruba Airwave Usage Licenses. Overview. Aruba Airwave Usage Licenses. Product overview. Features and Benefits
Product overview Centralized visibility and management for multivendor access networks. AirWave is a powerful and easy-to-use network operations system that not only manages wired and wireless infrastructures
More informationCisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services
Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business
More informationAirMagnet Enterprise Version 6.1. Release Notes. January 24, 2006
AirMagnet Enterprise Version 6.1 Table of Contents: Introduction, page 1 Special Notes, page 1 Warning, page 2 New Features, page 2 Known Issues, page 5 Release Notes Technical Support, page 7 Release
More informationDatasheet: AirMagnet Survey
Datasheet: AirMagnet Survey AirMagnet Survey is ideal for planning and designing 802.11 a/b/g/n/ac wireless LANs for optimal performance, security and compliance. It calculates the ideal quantity, placement
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationQuickSpecs. Models HP RF Manager Controller with 50-sensor License HP MSM415 RF Security Sensor
Overview Models HP RF Manager Controller with 50-sensor License HP MSM415 RF Security Sensor J9521A J9522A Key features Full support for HP and 3rd party WLANs Automatic intrusion threat prevention Central
More informationCentralized WLAN Troubleshooting
WHITE PAPER Centralized WLAN Troubleshooting Maximizing Wireless Network Availability Wireless Local Area Networks (WLAN) have proliferated within the enterprise. The business efficiencies realized though
More informationMR Cloud Managed Wireless Access Points
Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationSamsung Security AP WHITE PAPER
WHITE PAPER Introduction Due to their high speed and standardized features such as enhanced authentication and encryption, enterprise WLAN network systems are currently growing in their use as infrastructure
More informationFeatures Wi-Fi Network Health Assessment: DATA SHEETS
DATA SHEETS Datasheet: AirCheck Wi-Fi Tester for Windows AirCheck Wi-Fi Tester for Windows allows frontline technicians to quickly verify and troubleshoot 802.11 a/b/g/n/ac networks. Designed specifically
More informationCisco Identity Services Engine
Data Sheet Enterprise networks are more dynamic than ever before, servicing an increasing number of users, devices, and access methods. Along with increased access and device proliferation comes an increased
More informationNOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect
NOTHING IS WHAT IT SIEMs: COVER PAGE Simpler Way to Effective Threat Management TEMPLATE Dan Pitman Principal Security Architect Cybersecurity is harder than it should be 2 SIEM can be harder than it should
More informationMR Cloud Managed Wireless Access Points
MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise environments, the
More informationSECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry
SECURITY ON AWS By Max Ellsberry AWS Security Standards The IT infrastructure that AWS provides has been designed and managed in alignment with the best practices and meets a variety of standards. Below
More informationITSM SERVICES. Delivering Technology Solutions With Passion
ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past
More informationDatasheet: AirMagnet Survey
Datasheet: AirMagnet Survey AirMagnet Survey is ideal for planning and designing 802.11 a/b/g/n wireless LANs for optimal performance, security and compliance. It calculates the ideal quantity, placement
More informationMotorola AirDefense Retail Solutions Wireless Security Solutions For Retail
Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Wireless Risks in Retail The PCI Security Standards Council is an open global forum, founded by American Express, Discover Financial
More informationSIEMLESS THREAT MANAGEMENT
SOLUTION BRIEF: SIEMLESS THREAT MANAGEMENT SECURITY AND COMPLIANCE COVERAGE FOR APPLICATIONS IN ANY ENVIRONMENT Evolving threats, expanding compliance risks, and resource constraints require a new approach.
More informationReinvent Your 2013 Security Management Strategy
Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for
More informationTransforming Security from Defense in Depth to Comprehensive Security Assurance
Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new
More informationStep-by-Step: Handling RF Interference Challenges
WHITE PAPER Step-by-Step: Handling RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi
More informationAlcatel-Lucent OmniVista 2500 Network Management System
Alcatel-Lucent OmniVista 2500 Network Management System The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides cohesive management and network-wide visibility, increasing IT efficiency
More informationInnovative Solutions for Successful Wireless Network Management
Innovative Solutions for Successful Wireless Network Management Plan, Deploy and Troubleshoot Your Wireless Network with Fluke Networks Stay Ahead of Wireless Risks Not all wireless network threats are
More informationMR Cloud Managed Wireless Access Points
Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise
More informationAutomating the Top 20 CIS Critical Security Controls
20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises
More informationCONTENTS. Technology Overview. Workflow Integration. Sample Customers. How It Works
NetBrain s Adaptive Network Automation platform integrates with existing IT workflows to improve data visibility and streamline network assessment. NetBrain relieves engineers from manual CLIdigging and
More informationVersion 12 Highlights:
DATA SHEETS Unpublished Datasheet: OptiView XG Network Analysis Tablet - Version 12 Software Release and 10GBASE-T Network Adapter A dedicated tablet for automated network and application analysis, OptiView
More informationCisco Data Center Network Manager 5.1
Cisco Data Center Network Manager 5.1 Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization are adding
More informationOptiView. Series III Network Analyzer Wireless Suite Ensure Security, Performance and Compliance of Your Wireless LAN. Technical Datasheet
OptiView Series III Network Analyzer Wireless Suite Ensure Security, Performance and Compliance of Your Wireless LAN Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility and
More informationCisco 3300 Series Mobility Services Engine. Open, Appliance-Based Platform for Delivering Mobility Services
Data Sheet Cisco 3300 Series Mobility Services Engine: An Open, Appliance-Based Platform for Delivering Mobility Services Product Overview The Cisco 3300 Series Mobility Services Engine (Figure 1) is an
More informationThink Enterprise WLAN, Think Samsung
Think Enterprise WLAN, Think Samsung WLAN Solution Enjoy seamless connectivity and mobility with Samsung Wireless Enterprise Solution The wireless enterprise environment has faced a new paradigm shift
More informationIPS-1 Robust and accurate intrusion prevention
Security Check Point security solutions are the marketleading choice for securing the infrastructure. IPS-1 Robust and accurate intrusion prevention Today s s operate in an environment that is ever changing,
More informationALERT LOGIC LOG MANAGER & LOG REVIEW
SOLUTION OVERVIEW: ALERT LOGIC LOG MANAGER & LOG REVIEW CLOUD-POWERED LOG MANAGEMENT AS A SERVICE Simplify Security and Compliance Across All Your IT Assets. Log management is an essential infrastructure
More informationMaximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope
Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer Lancope Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NetFlow in Action h Network Operations
More informationThe Neutron Series Distributed Network Management Solution
Datasheet The Neutron Series Distributed Network ment Solution Flexible, Scalable, Enterprise-Class ment for Networks Both Large and Small Today s networks must be flexible, robust and as effective as
More informationISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002
ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION
More information<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g
Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Exadata Overview Oracle Exadata Database Machine Extreme ROI Platform Fast Predictable Performance Monitor
More informationCRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations
Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Integration with Numerous Type of Devices Flexible Architectural Configuration
More informationWhat is Penetration Testing?
What is Penetration Testing? March 2016 Table of Contents What is Penetration Testing?... 3 Why Perform Penetration Testing?... 4 How Often Should You Perform Penetration Testing?... 4 How Can You Benefit
More informationCampus Manager. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet
DataSheet Comprehensive NAC Solution Identity Management Endpoint Compliance Usage Policy Enforcement Historical Auditing and Reporting Out-of-Band Network Access Control for Wired, Wireless and VPN Networks
More informationCisco Unified Wireless Network Software Release 5.2
Cisco Unified Wireless Network Software Release 5.2 PB507140 Overview With Cisco Unified Wireless Network Software Release 5.2, Cisco is delivering critical features for its industry-leading indoor and
More informationApplication Note: OneTouch AT Cloud Service
Unpublished Application Note: OneTouch AT Cloud Service The NETSCOUT OneTouch AT Cloud Service extends OneTouch AT Network Assistant troubleshooting capability with new visibility into network performance
More informationDEVELOP YOUR TAILORED CYBERSECURITY ROADMAP
ARINC cybersecurity solutions DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP Getting started is as simple as assessing your baseline THE RIGHT CYBERSECURITY SOLUTIONS FOR YOUR UNIQUE NEEDS Comprehensive threat
More informationThe Changing Role of Wi-Fi Are You Ready for the Wireless. Ron Groulx Empowered Networks
The Changing Role of Wi-Fi Are You Ready for the Wireless Explosion? Ron Groulx Empowered Networks Abstract Wi-Fi Users have gone from "connecting" accessing Web pages and email at low bandwidth to "consuming"
More informationSnort: The World s Most Widely Deployed IPS Technology
Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,
More informationALIENVAULT USM FOR AWS SOLUTION GUIDE
ALIENVAULT USM FOR AWS SOLUTION GUIDE Summary AlienVault Unified Security Management (USM) for AWS is a unified security platform providing threat detection, incident response, and compliance management
More informationAP ac ACCESS POINT
PRODUCT SPEC SHEET AP 8232 802.11ac ACCESS POINT AP 8232 802.11ac ACCESS POINT TH THE POWER OF 5 GENERATION WI-FI A NEW LEVEL OF BANDWIDTH, PERFORMANCE AND FLEXIBILITY Every day, more of your workers are
More informationSymantec Network Security 7100 Series
Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network
More informationTroubleshooting WLAN with NSight HOW TO GUIDE
Troubleshooting WLAN with NSight HOW TO GUIDE September 2015 2015 ZIH Corp. All rights reserved. Zebra and the Stylized Zebra Head are trademarks of ZIH Corp, registered in many jurisdictions worldwide.
More informationWireless Mobile Workforce
DeltaV Distributed Control System Service Data Sheet Wireless Mobile Workforce Increased worker productivity and accuracy Mobile operations management Scalable, secure and reliable communications Full
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationCisco NCS Overview. The Cisco Unified Network Solution CHAPTER
CHAPTER 1 This chapter describes the Cisco Unified Network Solution and the Cisco Prime Network Control System (NCS). It contains the following sections: The Cisco Unified Network Solution, page 1-1 About
More informationEnterasys K-Series. Benefits. Product Overview. There is nothing more important than our customers. DATASHEET. Operational Efficiency.
DATASHEET Enterasys K-Series Product Overview The Enterasys K-Series is the most cost-effective, flow-based switching solution in the industry. Providing exceptional levels of automation, visibility and
More informationSecuring Your Airspace with WatchGuard s Wireless Intrusion Prevention (WIPS)
Securing Your Airspace with WatchGuard s Wireless Intrusion Prevention (WIPS) Introduction The proliferation of Wi-Fi across the globe has created an attractive opportunity for cyber attackers to snoop,
More informationCisco Unified Wireless Network Solution Overview
1 CHAPTER Unified Wireless Network Solution Overview This chapter summarizes the benefits and characteristics of the Unified Wireless Network for the enterprise.the Unified Wireless Network solution offers
More informationNetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.
NetWitness Overview 1 The Current Scenario APT Network Security Today Network-layer / perimeter-based Dependent on signatures, statistical methods, foreknowledge of adversary attacks High failure rate
More informationFLEXIBLE WIPS SENSOR SUPPORT
your business may be subjected to, such as PCI in retail and HIPAA in healthcare. Your network is protected every second of every day with comprehensive integrated security features that include layer
More informationThe Convergence of Security and Compliance
ebook The Convergence of Security and Compliance How Next Generation Endpoint Security Manages 5 Core Compliance Controls Table of Contents Introduction....3 Positive versus Negative Application Security....3
More informationReal-time Monitoring, Inventory and Change Tracking for. Track. Report. RESOLVE!
Real-time Monitoring, Inventory and Change Tracking for Track. Report. RESOLVE! Powerful Monitoring Tool for Full Visibility over Your Hyper-V Environment VirtualMetric provides the most comprehensive
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationDiscover threats quickly, remediate immediately, and mitigate the impact of malware and breaches
Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats
More informationComplying with RBI Guidelines for Wi-Fi Vulnerabilities
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines
More informationCisco Stealthwatch Endpoint License
Data Sheet Cisco Stealthwatch Endpoint License With the Cisco Stealthwatch Endpoint License you can conduct in-depth, context-rich investigations into endpoints that exhibit suspicious behavior. In our
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationDatasheet. Quad-Radio ac Wave 2 Access Point with Dedicated Security Radio. Model: UAP-XG
Quad-Radio 802.11ac Wave 2 Access Point with Dedicated Security Radio Model: UAP-XG Simultaneous Tri-Band 4x4 Multi-User MIMO Dedicated Security Radio with Persistent Threat Management Real-Time Spectrum
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationWireless and Network Security Integration Solution Overview
Wireless and Network Security Integration Solution Overview Solution Overview Introduction Enterprise businesses are being transformed to meet the evolving challenges of today's global business economy.
More informationXerox and Cisco Identity Services Engine (ISE) White Paper
Xerox and Cisco Identity Services Engine (ISE) White Paper Contents Securing Your Networked Printing Devices... 1 Providing Security in an Internet of Things World... 1 Cisco ISE: A Powerful, Simple and
More informationThe Aruba S3500 Mobility Access Switch
Tech Brief Enterprise The Aruba S3500 Mobility Access Switch Tech Brief: The Aruba S3500 Mobility Access Switch Table of Contents Introducing the Aruba S3500 Mobility Access Switch... 2 Flexible deployment
More informationOSSIR. 8 Novembre 2005
OSSIR 8 Novembre 2005 Arbor Networks: Security Industry Leader Arbor s Peakflow products ensure the security and operational integrity of the world s most critical networks Solid Financial Base Sales have
More information